University of Tehran

Kish International Campus

Master Program in

Information Technology- Information Security

Introduction

The Master of Information Technology – Information Security program at Kish campus of University of Tehran is a graduate professional program that prepares students to work in the high-demand IT security industry
To achieve the objectives of the program and to enhance students' learning experience, Kish campus provides an Information Security Lab to enhance the curriculum of the program. This lab facility hosts an array of network settings and consists of a variety of network in a secure setting.

The curriculum also provides students with the opportunity to apply core course concepts to a substantial project in the workplace. This plan of study introduces students to the fundamental knowledge of the ever-changing IT security field.


 

Master Degree Curriculum in Information Technology- Information Security

Part A: Core Courses

Row

Course Name

Units

Hours

Practical (Hours)

1

Fundamentals of Information Systems Security

3

48

 

2

Applied Cryptography

3

48

 

3

Network Security

3

48

 

4

Secure Computer Systems

3

48

 

5

Database Security

3

48

 

6

Security Protocols

3

48

 

7

Seminar

2

32

 

 

       

Total

20

   

Part B: Elective Courses (2 Courses must be elected)

Row

Course Name

Units

Hours

Practical (Hours)

1

Security Architecture, Design and Analysis

3

48

 

2

Advanced Topics in Information Security

3

48

 

3

E-Commerce Security

3

48

 

4

Secure Communication Systems

3

48

 

5

Secure System Management

3

48

 

6

Formal Models and Information Security

3

48

 

7

Information Hiding

3

48

 

Total

6

   

Part C: Thesis

Row

Course Name

Units

Hours

Lab(Hours)

1

Thesis

6

   

Total

6

   

 

Fundamentals of Information Systems Security

Course content:

The Need for Information Security , Information Systems Security, The Internet of Things Is Changing How We Live, Malicious Attacks, Threats, and Vulnerabilities, The Drivers of the Information Security Business, Access Controls, Security Operations and Administration, Auditing, Testing, and Monitoring, Risk, Response, and Recovery, Cryptography, Networks and Telecommunications, Malicious Code and Activity, Information Security Standards, Information Systems Security Education and Training, U.S. Compliance Laws

References

[1]

D. Kim and M. G. Solomon, Fundamentals of Information Systems Security, Jones & Bartlett Learning, 2016.


Applied Cryptography

Course content:

Foundations, Protocol building blocks, Basic protocols, Intermediate protocols, Advanced protocols, Esoteric protocols, Key length, Key management, Algorithm types and modes, Using algorithms, Mathematical background, Data encryption standard, Other block ciphers, Stil other block ciphers, Combinig block ciphers, Pseudo-random-sequence generators and stream ciphers, Other stream ciphers and real random-sequence generators, One-way hash functions, Public-key algorithms, Public-key digital signature algorithms, Identification schemes, Key-exchage algorithms, Special algorithms for protocols, Politics

References

[1]

B. Schneier, applied cryogrhy :protocols, algorithms, and source code in c, wiley, 2017.


Network Security

Course content:

Computer Network Fundamentals, Computer Network Security Fundamentals, Security Threats and Threat Motives to Computer Networks, Introduction to Computer Network Vulnerabilities, Cyber Crimes and Hackers, Scripting and Security in Computer Networks and Web Browsers, Security Assessment, Analysis, and Assurance, Disaster Management, Access Control and Authorization, Authentication, Cryptography, Firewalls, System Intrusion Detection and Prevention, Computer and Network Forensics, Virus and Content Filtering, Standardization and Security Criteria: Security Evaluation of Computer Products, Computer Network Security Protocols, Security in Wireless Networks and Devices, Security in Sensor Networks, Virtualization Technology and Security, Cloud Computing Technology and Security, Mobile Systems and Corresponding Intractable Security Issues, Internet of Things (IoT): Growth, Challenges, and Security

References

[1]

J. M. Kizza, Guide to Computer Network Security, Springer, 2017.


Secure Computer Systems

Course content:

Introduction to Computer Architecture and Security, Digital Logic Design, Computer Memory and Storage , Bus and Interconnection, I/O and Network Interface, Central Processing Unit , Advanced Computer Architecture, Assembly Language and Operating Systems, TCP/IP and Internet, Design and Implementation: Modifying Neumann Architecture

References

[1]

S. . Wang and R. S. Ledley, computer architecture and security, Wiley, 2013.


Database Security

Course content:

Recent Advances in Access Control, Access Control Models for XML, Access Control Policy Languages in XML, Database Issues in Trust Management and Trust Negotiation, Authenticated Index Structures for Outsourced Databases, Towards Secure Data Outsourcing, Managing and Querying Encrypted Data, Security in Data Warehouses and OLAP Systems, Security for Workflow Systems, Secure Semantic Web Services, Geospatial Database Security, Security Re-engineering for Databases: Concepts and Techniques, Database Watermarking for Copyright Protection, Database Watermarking: A Systematic View, Trustworthy Records Retention, Damage Quarantine and Recovery in Data Processing Systems, Hippocratic Databases: Current Capabilities and Future Trends, Privacy-Preserving Data Mining: A Survey, Privacy in Database Publishing: A Bayesian Perspective, Privacy Preserving Publication: Anonymization Frameworks and Principles, Privacy Protection through Anonymity in Location-based Services, Privacy-enhanced Location-based Access Control, Efficiently Enforcing the Security and Privacy Policies in a Mobile Environment

References

[1]

M. Gertz and S. Jajodia, Handbook of Database Security: Applications and Trends, Springer, 2008.


Security Protocols

Course content:

Preliminaries, Operational Semantics, Security Properties, Verification , Multi-protocol Attacks, Generalizing NSL for Multi-party Authentication, Historical Background and Further Reading

References

[1]

C. Cremers and S. Mauw, Operational Semantics and Verification of Security Protocols, Springer, 2012.


Security Architecture, Design and Analysis

Course content:

Network security foundations, Designing secure networks, Secure network designs

References

[1]

S. Convery, Network Security Architectures, Cisco Press, 2004.


Advanced Topics in Information Security

Course Contents:

Critically evaluate some of the important past and current research that has been undertaken within the information systems discipline;

Demonstrate an appreciation of the diversity of research currently being undertaken within the information systems discipline;

Identify research articles in the information systems discipline that they might wish to use in their theses or research report;

Distinguish among research approaches in the information systems discipline and identify approaches that might be useful in subsequent work.

· A Bit of Theory

· Coordination in Standards Setting

· The Issue of Speed

· IPR Problems

  • Applications

· The Economic Perspective

· After Standardization

References

[1]

K. Jakobs, Advanced Topics in Information Technology Standards and Standardization Research Series, Idea Group , 2006.


E-Commerce Security

Course content:

Security Testing of an Online Banking Service, Software Security Analysis, New Security Issues in Mobile E-Commerce, Problems in Policing E-Commerce Crime, Strategies for Developing Policies and Requirements for Secure and Private Electronic Commerce, Protocols for Secure Remote Database Access with Approximate 87
Matching, A New Approach to Reasoning about Accountability in Cryptographic Protocols for E-Commerce, Provisional Authorizations

References

[1]

A. K. Ghosh, e-commerce security and privacy, Kluwer Academic Publishers, 2001.


Secure Communication Systems

Course content:

Threats and Solutions, An Introduction to Encryption and Security Management, Voice Security in Military Applications, Telephone Security, Secure GSM systems, Security in Private VHF/UHF Radio Networks, Electronic Protection Measures - Frequency Hopping, Link and Bulk Encryption, Secure Fax Network, PC Security, Secure Email, Secure Virtual Private Networks, Military Data Communication, Management, Support and Training

References

[1]

R. Sutton, Secure Communication: Applications and Management, wiley, 2002.


Secure System Management

Course content:

Challenges in Managing Information Security in the New Millennium , Information Systems Security and the Need for Policy , New Millennium; New Technology; Same Old Right and Wrong , Ethical Elements of Security and Developments in Cyberspace that Should Promote Trust in Electronic Commerce , Cyber Terrorism and the Contemporary Corporation , Addressing Prescription Fraud in the British National Health Service: Technological and Social Considerations , The Irish Experience with Disaster Recovery Planning: High Levels of Awareness May Not Suffice , An Analysis of the Recent IS Security Development Approaches: Descriptive and Prescriptive Implications , Internet and E-Business Security , Assurance and Compliance Monitoring Support , Intelligent Software Agents: Security Issues of a New Technology , Principles for Managing Information Security in the New Millennium

References

[1]

G. Dhillon, Information Security Management: Global Challenges in the New Millennium, Idea Group, 2001.


Formal Models and Information Security

Course content:

Running example, Messages and deduction, Equational theory and static equivalence, A cryptographic process calculus, Security properties, Automated verification: bounded case, Automated verification: unbounded case, Further readings and conclusion

References

[1]

V. Cortier, Formal Models and Techniques for Analyzing Security Protocols, V. Cortier and S. Kremer, 2014.


Information Hiding

Course content:

Introduction to Information Hiding, Multimedia Steganography, Steganalysis, Network Steganography, Robust Watermarking, Watermarking Security, Fingerprinting, Fragile and Authentication Watermarks, Media Forensics, Watermarking in the Encrypted Domain

References

[1]

S. Katzenbeisser and F. Petitcolas, Information Hiding, ARTECH HOUSE, 2016.